NSA Surveillance: the Implications for Civil Liberties

Total Page:16

File Type:pdf, Size:1020Kb

NSA Surveillance: the Implications for Civil Liberties NSA Surveillance: The Implications for Civil Liberties SHAYANA KADIDAL* What are the implications for civil liberties of the massive surveillance programs that have come to public attention as a result of Edward Snowden's disclosures? The first challenge for anyone attempting to unravel this issue is the natural tendency of the public to shrug' at the volume and complexity of the information flooding out 11 from both Snowden and other official sources that have started to speak to the media under the cover of his disclosures. The stories are rapidly evolving, and frankly, complex enough to confuse anyone. But in my view, the greatest contributor to the apparent complexity is the maze of ever-shifting, always highly technical legal justifications for the various programs at issue. In what follows, I will argue that the actual surveillance taking place is remarkably consistent from the Bush administration to the present day; although the legal rationales for the surveillance programs are protean, the programs themselves- and therefore their implications for civil liberties-are largely consistent. It is therefore both more enlightening (and simpler) to start a few years in the past, when most of us first heard about the National Security Agency (NSA), in late 2005 when James Risen and Eric Lichtblau of the New York Times broke the story2 that the NSA was collecting large quantities of calls and emails without getting * Senior Managing Attorney, Center for Constitutional Rights, New York City; J.D., Yale, 1994. The views expressed herein are not those of the author's employer, nor, if later proven incorrect, of the author. 1In internet terms, "TL;DR.". 2 James Risen & Eric Lichtblau, Bush Lets US Spy on Callers without Courts, N.Y. TJMES (Dec. 16, 2005), http://www.nytimes.Com/2005/12/16/polities/i6program.html?pagewanted=all. I/S: A JOURNAL OF LAW AND POLICY [VOL. 10:2 approval from a court first, as usually happens with a conventional wiretap warrant. 1. 21 ST CENTURY SURVEILLANCE: A BRIEF HISTORY After holding the story for more than a year-past the 2004 presidential election-the Times finally published it in December 2005, shortly before Risen's book State of War (which included a chapter on the program) was scheduled for publication. Being the product of such a lengthy period of reporting, the story was rich in detail, but the main revelation was that the NSA, with presidential approval, has since shortly after 9/11 been intercepting calls and emails where one communicant was inside the U.S. and one abroad, where it believed that one of the parties was somehow affiliated with terrorism, all without any warrants or degree of judicial review whatsoever. The story was reported as an example of blatant lawlessness, for this "NSA Program" or "Program" (as I will call it throughout) appeared to circumvent the post-Watergate Foreign Intelligence Surveillance Act (FISA) that was designed to subject most foreign intelligence wiretapping to a system of judicial review similar to that that had applied to domestic wiretaps for criminal investigatory purposes since the 1968 Wiretap Act ("Title III"). Indeed, the Bush Administration, which chose to aggressively defend the Program in the media, admitted as much: surveillance under the Program was of the sort that ordinarily would have been subject to FISA.3 That 1978 FISA statute, by appearances, was quite permissive: If the government could provide to the specialized Foreign Intelligence Surveillance Court (FISC) evidence creating probable cause to suspect that a target was working for a foreign power (defined to include terrorist groups), it could get a FISA order-essentially, a wiretap warrant-allowing surveillance of that target's communications. In practice as well as in theory it seemed easy enough for the government to use: There were only five outright rejections among the first 22,987 applications after 1978. 4 Though the administration would argue that 3 See Petition for a Writ of Certiorari at 6, Center for Constitutional Rights v. Obama, No. 13-802 (Jan. 2, 2014), availableat http://ccrjustice.org/files/Center%2ofor%20Constitutional%2ORights%2Ov%20%20 ObamaPetition%2ofor%2oWrit.pdf. 4 See Petition for Certiorari, supra note 3, at 5; ForeignIntelligence SurveillanceAct Court Orders 1979-2012, Electronic Privacy Information Center (May 1, 2014), http://epic.org/privacy/wiretap/stats/fisa-stats.html. It does appear that the process before the FISC occasionally results in modifications of the initial applications; this occurred in roughly 2% of the applications submitted in 2012, for instance. Id. 2014] KADIDAL judicial approval stood in the way of "speed and agility" in tracking down targets,' like Title III the original 1978 FISA provided for retroactive judicial approval in the event of emergencies. And in any event, the administration never asked a rather pliant Congress for approval of changes to the FISA statute, instead proceeding by executive fiat. The political shockwaves the story generated were largely a consequence of this gross illegality; indeed the administration's spin seemed to project pride in its willingness to break the law, which added to the unease in my own community of civil libertarian litigators. Why not use FISA if the statute was that easy to work with? Our main suspicion at the time was that the administration was trying to eavesdrop on communications that even a very compliant FISC judge would not approve of intercepting: conversations between lawyers and their clients, journalists and their sources. The description of the program-international calls and emails, with one end in the U.S., where one party was suspected (by an NSA staffer, not necessarily based on any tangible evidence) of association with terrorism-fit a vast quantity of our legally-privileged communications. The Center for Constitutional Rights's (CCR) legal staff frequently calls or emails released Guantanamo detainees, their families, or witnesses relevant to their cases, or other overseas lawyers and experts. We also represented torture rendition victim Maher Arar, who lived in Canada at the time of the disclosures, having been released after a year of torture in Syria at the behest of our government, and representatives of a class of immigration detainees unfairly labeled as of interest to the 9/11 investigation, subject to over- long detention under brutal conditions, and subsequently deported overseas. They were all potential targets of the program, and though we need to communicate with them, we felt we had to take costly and burdensome countermeasures (such as traveling overseas to meet in person rather than using the phone) given the existence of this judicially-unsupervised program of surveillance (which by definition did not operate under any judicially-supervised minimization procedures that might otherwise protect plaintiffs' legally privileged communications6 ). We felt the costs created by those counter- measures, the concrete manifestations of the chilling effect cast by the NSA Program, were sufficient to create injury-in-fact for standing 5 Press Release, The White House, Setting the Record Straight: Critics Launch Attacks Against Program to Detect and Prevent Terrorist Attacks (Jan. 4, 2oo6), availableat https://www.fas.org/irp/news/2006/ol/wholo4o6.html. 6 On minimization of legally-privileged communications, see infranote 98 and accompanying text. I/S: A JOURNAL OF LAW AND POLICY [V01. 10:2 purposes, so CCR brought suit seeking to enjoin the Program;7 the ACLU brought a similar suit (on behalf of itself, other lawyers, and journalists) on the same day in January 2oo6.8 However, there were clues even then that this targeted NSA Program was only one aspect of the NSA's expanded post-9/11 surveillance activities. Risen and Lichtblau's initial story-and later others-reported, based on inside NSA sources, that there was a "data mining" component to the program-meaning, essentially, that the NSA was intercepting electronic communications (calls and emails) in a general fashion, not a targeted one, and then either scanning the content of those communications for the presence of certain keywords thought to be themselves suspicious, or applying more complex algorithms to that huge database to flag communications or the parties thereto for further scrutiny. To use a simple example of the latter, suppose a call comes in to a U.S. number from Afghanistan in the middle of the night, and the person called then calls five other people within an hour. A mechanical algorithm can easily identify such situations (even where there was no prior reason to suspect any of the persons on the calls) and flag them for further review. The pattern the algorithm identifies may be characteristic of sleeper cells triggered to action; it may also be characteristic of a family wedding announcement being passed along to close relatives. Within short order, a case was filed seeking damages against AT&T based on what appeared to be its complicity in just such a massive data-mining operation against its own customers. 9 An AT&T employee whistleblower, Mark Klein, had disclosed to attorneys at the Electronic Frontier Foundation (EFF) the existence of a secret room in AT&T's Folsom St., San Francisco switching station. It appeared that a copy of every electronic communication coming in off the fiber optic undersea cables that entered AT&T's domestic system through the Folsom St. station was being sent off to the NSA through the equipment installed in the secret room; the only people who would enter the room were NSA staffers and one AT&T employee who held the highest security clearance. The complaint in the Electronic Frontier Foundation's case, Hepting v. AT&T, also alleged that AT&T had turned over its vast call records database to the government too- 7 CCR v. Obama, CENTER FOR CONSTITUTIONAL RIGHTS (2013), http://ccrjusfice.org/CCR- v-Obama.
Recommended publications
  • Listener Feedback #171
    Security Now! Transcript of Episode #411 Page 1 of 40 Transcript of Episode #411 Listener Feedback #171 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-411.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-411-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got questions from our audience. We're going to answer those, talk a little bit about the math around NSA's 5ZB, also some more revelations on SSL security. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 411, recorded July 3rd, 2013: Your questions, Steve's answers, #171. It's time for Security Now!, the show that protects you and your loved ones online, your privacy, and also gives you deep insight into how computers work, how technology works, how the Internet works, with this guy here. Yeah, he's the Explainer in Chief, Mr. Steve Gibson. Hello, Steven. Steve Gibson: You know, Leo, I wondered whether maybe we'd gone a little, you know, there's the expression "jump the shark," or off, over the top or something last week.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Drowning in Data 15 3
    BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Protecting More Than the Front Page: Codifying a Reporterâ•Žs Privilege for Digital and Citizen Journalists
    Notre Dame Law Review Volume 89 | Issue 3 Article 10 2-2014 Protecting More than the Front Page: Codifying a Reporter’s Privilege for Digital and Citizen Journalists Kathryn A. Rosenbaum Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Part of the Criminal Law Commons, Criminal Procedure Commons, and the First Amendment Commons Recommended Citation 89 Notre Dame L. Rev. 1427 This Article is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. \\jciprod01\productn\N\NDL\89-3\NDL310.txt unknown Seq: 1 11-FEB-14 9:04 PROTECTING MORE THAN THE FRONT PAGE: CODIFYING A REPORTER’S PRIVILEGE FOR DIGITAL AND CITIZEN JOURNALISTS Kathryn A. Rosenbaum* “‘The reporters who work for the Times in Washington have told me many of their sources are petrified even to return calls,’ Jill Abramson, the executive editor of The New York Times, said . on CBS’s Face The Nation broadcast. ‘It has a real practical effect that is important.’”1 INTRODUCTION The stifling of investigative journalism stems in part from a torrent of stories in 2013 regarding the government’s intrusive tracking of journalists’ and individuals’ cell phone records and e-mails without their knowledge.2 The federal government also tracked two months of call records of more than twenty Associated Press phone lines.3 In a leak probe regarding a news story about North Korea, the government surreptitiously obtained informa- tion about Fox News Chief Washington Correspondent James Rosen.4 Offi- cials monitored his “security badge access records to track the reporter’s comings and goings at the State Department[,] .
    [Show full text]
  • Policy Approaches to the Encryption Debate
    CONTENTS Introduction 1 Encryption: An overview 2 The “Going Dark” problem and the backdoor debate 2 Question One: Is a backdoor necessary or useful? 4 Lack of empirical evidence 4 Legal restrictions 5 Efficacy and utility of already available technology 6 Associated policy recommendations 8 Collect quantitative evidence of need 8 Increase resources and training for law enforcement 8 Question Two: Is there a passable technical solution? 9 Associated policy recommendations 10 Conduct adversarial testing 10 Question Three: Is there a workable policy implementation? 10 Associated policy recommendations 12 Conduct scenario planning 12 Conclusion 12 About the authors 13 R STREET POLICY STUDY NO. 133 March 2018 individual rights and public security if strong encryption is compromised. These polarized views have left policymakers at an impasse. However, such seemingly irreconcilable perspectives on POLICY APPROACHES TO THE either side of the debate arise primarily because encryption ENCRYPTION DEBATE policy is treated as a thought experiment, often with over- simplified facts coupled with a great deal of certainty. For example, the most commonly employed hypothetical scenar- Charles Duan, Arthur Rizer, io involves the following: an encrypted message or communi- Zach Graves and Mike Godwin cation that—if only the government were able read it—would reveal the secrets required to stop a deadly attack or to bring INTRODUCTION a terrorist to justice. fierce debate has been ongoing for many years over This resembles another famous thought experiment: the strong computer encryption of communications and “ticking time bomb,” where torturing a suspect is the guar- data, which can both deliver security and privacy for anteed and only means to defuse the bomb.2 While this latter individuals but also make it difficult for the intelli- conundrum has also generated volumes of polarized debate, Agence and law enforcement communities to perform their its most pragmatic solution is one that can also be applied surveillance and investigative duties.
    [Show full text]
  • Article: Why Dylann Roof Is a Terrorist Under Federal Law, and Why It Matters
    ARTICLE: WHY DYLANN ROOF IS A TERRORIST UNDER FEDERAL LAW, AND WHY IT MATTERS Winter, 2017 Reporter 54 Harv. J. on Legis. 259 * Length: 19820 words Author: Jesse J. Norris 1 * Highlight After white supremacist Dylann Roof killed nine African-Americans at a Charleston, South Carolina church, authorities declined to refer to the attack as terrorism. Many objected to the government's apparent double standard in its treatment of Muslim versus non-Muslim extremists and called on the government to treat the massacre as terrorism. Yet the government has neither charged Roof with a terrorist offense nor labeled the attack as terrorism. This Article argues that although the government was unable to charge Roof with terrorist crimes because of the lack of applicable statutes, the Charleston massacre still qualifies as terrorism under federal law. Roof's attack clearly falls under the government's prevailing definition of domestic terrorism. It also qualifies for a terrorism sentencing enhancement, or at least an upward departure from the sentencing guidelines, as well as for the terrorism aggravating factor considered by juries in deciding whether to impose the death penalty. Labeling Roof's attack as terrorism could have several important implications, not only in terms of sentencing, but also in terms of government accountability, the prudent allocation of counterterrorism resources, balanced media coverage, and public cooperation in preventing terrorism. For these reasons, this Article contends that the government should treat the Charleston massacre, and similar ideologically motivated killings, as terrorism. This Article also makes two policy suggestions meant to facilitate a more consistent use of the term terrorism.
    [Show full text]
  • How Noninstitutionalized Media Change the Relationship Between the Public and Media Coverage of Trials
    06__WHEELER__CONTRACT PROOF.DOC 11/18/2008 11:41:41 AM HOW NONINSTITUTIONALIZED MEDIA CHANGE THE RELATIONSHIP BETWEEN THE PUBLIC AND MEDIA COVERAGE OF TRIALS MARCY WHEELER* I INTRODUCTION Justice Brennan’s concurring opinion in Nebraska Press Ass’n v. Stuart1 puts citizenship and the public at the heart of the purpose of media coverage of legal proceedings: Commentary and reporting on the criminal justice system is at the core of the First Amendment values, for the operation and integrity of that system is of crucial import to citizens concerned with the administration of government. Secrecy of judicial action can only breed ignorance and distrust of courts and suspicion concerning the competence and impartiality of judges; free and robust reporting, criticism, and debate can contribute to public understanding of the rule of law and to comprehension of the functioning of the entire criminal justice system, as well as improve the quality of that system by subjecting it to the cleansing effects of exposure and public accountability.2 That is, media coverage of legal proceedings should further the public understanding of those proceedings and of the legal system generally and should foster oversight over its functioning. Unfortunately, much coverage of legal proceedings now serves to increase ratings rather than to increase the public’s understanding of the justice system.3 Moreover, examples like early coverage of the Duke lacrosse case show that the press can exacerbate—rather than expose—abuses of the judicial system and the legal system generally. Since the advent of the Internet, however, additional media outlets—like blogs and wikis—have begun to change the relationship between media Copyright © 2008 by Marcy Wheeler.
    [Show full text]
  • Help Decide the Future of SJ County Iran: We Need to Stop the Next
    San Joaquin County’s Alternative Newspaper PRICELESS connections Volume XXV, Number 2 Published by the Peace & Justice Network since 1986 March 2007 Help decide the Iran: we need to SAVE THE DATES future of SJ County stop the next war As we at FCNL walk the an Iranian diplomatic office in Matt Perry March 10 halls of Congress lobbying Erbil, Iraq has caused tensions The population of against the escalation of the not only with Iran but also with foreign policy San Joaquin County war in Iraq, we are hearing also the government of Iraq, which symposium film ....20 is projected to double new concerns from members of condemned the raids. Adding by 2030, and to grow Congress about President Bush's fuel to this conflict was the White by over a million escalating confrontation with House decision last week to tell March 17 new people by 2050. Iran and President Ahmadinejad's reporters that President Bush has Such dramatic growth escalating confrontation with the authorized U.S. soldiers in Iraq to peace convergence raises major questions: U.S. The president accuses Iran kill or capture Iranians in Iraq that with dolores huerta . Where and how should of sponsoring armed, violent the U.S.administration believes to we grow? Where will groups inside Iraq and said in be aiding Shite milita groups. ...........................20 the roads go? How do a January 29 interview that the A f e w d a y s a f t e r t h a t we want this growth U.S. will 'respond firmly' to any announcement, Vice President to affect our economy, Iranian interference in Iraq.
    [Show full text]